Germany Unmasks Key REvil and GandCrab Ransomware Suspects

German Authorities Identify Suspects Believed to be Key Members of REvil and GandCrab Ransomware Gangs

MEDIUM
April 19, 2026
5m read
Threat ActorRansomwareRegulatory

Related Entities

Threat Actors

Organizations

Other

Daniil ShchukinAnatoly KravchukGandCrab Akira Qilin

Full Report

Executive Summary

German law enforcement officials have taken a significant step in holding cybercriminals accountable by publicly identifying two Russian nationals, Daniil Shchukin (also known as 'UNKN') and Anatoly Kravchuk, as key operatives within the infamous GandCrab and REvil (Sodinokibi) ransomware syndicates. The suspects are wanted in connection with a series of attacks that extorted millions and caused tens of millions of dollars in damages. This action is part of a coordinated European initiative aimed at disrupting Russian-based cybercrime operations. Although the REvil group was officially taken down in 2021, this development underscores that efforts to pursue its members are ongoing, even as challenges remain in bringing them to justice due to their suspected location in Russia.

Threat Overview

GandCrab and its successor, REvil, were two of the most prolific and destructive ransomware-as-a-service (RaaS) operations in history. They pioneered the double extortion tactic, which involves not only encrypting victim data but also exfiltrating it and threatening to leak it publicly if the ransom is not paid (T1486 - Data Encrypted for Impact and T1041 - Data Exfiltration Over C2 Channel).

  • GandCrab: Active from 2018 to 2019, it was one of the first highly successful RaaS operations, infecting hundreds of thousands of victims and generating massive profits for its operators and affiliates.
  • REvil (Sodinokibi): Emerging shortly after GandCrab's supposed retirement, REvil was widely believed to be operated by the same core group. It became notorious for its high-profile attacks on major corporations and critical infrastructure, demanding multi-million dollar ransoms.

The identification of Shchukin and Kravchuk links specific individuals to these widespread criminal campaigns. They are accused of participating in at least 24 attacks, resulting in $2.3 million in direct extortion payments and an estimated $40 million in total damages, highlighting the significant economic impact of their activities.

Technical Analysis

The TTPs of GandCrab and REvil were well-documented and evolved over time. Common techniques included:

Impact Assessment

The impact of these ransomware groups was global and devastating.

  • Financial Loss: Victims suffered direct financial losses from ransom payments, business downtime, and recovery costs. The $40 million in damages attributed to just 24 attacks by these two suspects shows the scale of the problem.
  • Operational Disruption: Attacks on hospitals, local governments, and businesses caused significant disruption to essential services.
  • Data Breaches: The double extortion model meant that even if a company could recover from backups, they still faced a data breach, with sensitive corporate or customer data being leaked online.

The public identification of suspects, while largely symbolic without an arrest, serves to disrupt their operations, apply pressure, and signal a commitment from law enforcement to pursue these actors.

IOCs

No specific IOCs related to the 24 attacks were provided in the source articles.

Detection & Response

Detection Strategies:

  1. Behavioral Analysis: Deploy EDR solutions that use behavioral analysis to detect ransomware activity, such as rapid file modification/encryption, attempts to delete shadow copies (vssadmin), and the execution of suspicious commands. This is a core part of Process Analysis (D3-PA).
  2. Credential Dumping Detection: Monitor for processes accessing the LSASS memory space, a common technique used by tools like Mimikatz to steal credentials. This is a form of OS Credential Dumping (D3-OCD).
  3. Network Monitoring: Look for lateral movement activity, such as an unusual number of RDP or SMB connections originating from a single host. Monitor for large, anomalous outbound data transfers that could indicate data exfiltration prior to encryption.

Mitigation

  • Patch Management: Aggressively patch vulnerabilities in internet-facing systems like VPNs and RDP servers. This is the most effective way to prevent initial access (M1051 - Update Software).
  • Secure Backups: Maintain offline, immutable, and regularly tested backups. This ensures you can recover without paying a ransom (M1053 - Data Backup).
  • Network Segmentation: Segment your network to prevent ransomware from spreading from a single compromised workstation to the entire enterprise (M1030 - Network Segmentation).
  • Restrict Privileged Accounts: Enforce the principle of least privilege. Limit the number of domain administrator accounts and use Privileged Access Management (PAM) solutions (M1026 - Privileged Account Management).

Timeline of Events

1
January 1, 2021
The REvil ransomware group was dismantled in a coordinated international operation.
2
April 19, 2026
This article was published

MITRE ATT&CK Mitigations

Aggressively patch vulnerabilities in internet-facing systems to prevent the initial access vectors commonly used by these groups.

Mapped D3FEND Techniques:

Maintain offline, immutable backups to ensure recovery capabilities without paying the ransom.

Segment networks to contain ransomware spread and protect critical assets.

Mapped D3FEND Techniques:

Strictly control and monitor the use of privileged accounts to prevent lateral movement and widespread encryption.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The primary initial access vector for ransomware groups like REvil and GandCrab was the exploitation of known vulnerabilities in internet-facing systems. Therefore, the most effective countermeasure is a rigorous and timely Software Update program. Organizations must have a comprehensive asset inventory to know what systems are exposed to the internet (e.g., VPNs, RDP gateways, web servers). A vulnerability management program must be in place to continuously scan these assets for new vulnerabilities. When a critical patch is released by a vendor, it must be treated as an emergency and deployed within hours or days, not weeks or months. Prioritize patching based on exposure and criticality. This proactive 'shield's up' posture hardens the perimeter and denies attackers the low-hanging fruit they rely on to get into a network, forcing them to use more difficult and easier-to-detect methods like phishing.

To neutralize the 'impact' portion of a ransomware attack, a robust Data Backup strategy is non-negotiable. This goes beyond simple backups. Organizations must follow the 3-2-1 rule: three copies of data, on two different media, with one copy off-site and offline or immutable. 'Immutable' is the key concept here. By using cloud storage with object lock or on-premises solutions that create write-once-read-many (WORM) backups, organizations can ensure that even if an attacker gains administrative control of the network, they cannot delete or encrypt the backup data. This is crucial because a primary TTP of REvil was to actively seek out and destroy backups. Regularly testing the restoration process is also critical to ensure the backups are viable. A successful backup strategy removes the attacker's primary leverage (data unavailability) and allows the organization to restore operations without paying the ransom.

Detecting and preventing OS Credential Dumping is key to stopping lateral movement. REvil and other groups heavily rely on tools like Mimikatz to extract credentials from memory, particularly from the LSASS process. Modern EDR solutions and Windows Defender itself have specific protections against this. Ensure that Attack Surface Reduction (ASR) rules are enabled, specifically the rule 'Block credential stealing from the Windows local security authority subsystem (lsass.exe)'. Additionally, monitor for any process attempting to open a handle to lsass.exe with PROCESS_VM_READ rights, as this is a strong indicator of a credential dumping attempt. Alerting on this behavior allows security teams to intervene early in the attack lifecycle, isolating the compromised host before the attacker can use the stolen credentials to move laterally and deploy ransomware across the entire network.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

REvilGandCrabRansomwareCybercrimeLaw EnforcementRussia

📢 Share This Article

Help others stay informed about cybersecurity threats